{"id":"https://openalex.org/W2606228508","doi":"https://doi.org/10.1145/3196494.3196540","title":"CUP","display_name":"CUP","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2606228508","doi":"https://doi.org/10.1145/3196494.3196540","mag":"2606228508"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3196540","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196540","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196540","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196540","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Nathan Burow","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nathan Burow","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Derrick McKee","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Derrick McKee","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Scott A. Carr","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Scott A. Carr","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":null,"display_name":"Mathias Payer","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mathias Payer","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":1.8614,"has_fulltext":true,"cited_by_count":34,"citation_normalized_percentile":{"value":0.88710556,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"381","last_page":"392"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.6797000169754028},{"id":"https://openalex.org/keywords/false-positives-and-false-negatives","display_name":"False positives and false negatives","score":0.6547999978065491},{"id":"https://openalex.org/keywords/call-stack","display_name":"Call stack","score":0.5365999937057495},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.48980000615119934},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.46560001373291016},{"id":"https://openalex.org/keywords/heap","display_name":"Heap (data structure)","score":0.42100000381469727},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.4009000062942505},{"id":"https://openalex.org/keywords/address-space","display_name":"Address space","score":0.38440001010894775},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.3840000033378601}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7867000102996826},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.6797000169754028},{"id":"https://openalex.org/C112789634","wikidata":"https://www.wikidata.org/wiki/Q18207010","display_name":"False positives and false negatives","level":3,"score":0.6547999978065491},{"id":"https://openalex.org/C119024030","wikidata":"https://www.wikidata.org/wiki/Q759899","display_name":"Call stack","level":3,"score":0.5365999937057495},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.48980000615119934},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.46560001373291016},{"id":"https://openalex.org/C134757568","wikidata":"https://www.wikidata.org/wiki/Q274089","display_name":"Heap (data structure)","level":2,"score":0.42100000381469727},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.4009000062942505},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3901999890804291},{"id":"https://openalex.org/C144240696","wikidata":"https://www.wikidata.org/wiki/Q367204","display_name":"Address space","level":2,"score":0.38440001010894775},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.3840000033378601},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3637999892234802},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.3617999851703644},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.3582000136375427},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.3571999967098236},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.35040000081062317},{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.3497999906539917},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.34869998693466187},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.3418000042438507},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3199999928474426},{"id":"https://openalex.org/C28180684","wikidata":"https://www.wikidata.org/wiki/Q4080983","display_name":"Memory safety","level":3,"score":0.31520000100135803},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3125},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.2892000079154968},{"id":"https://openalex.org/C200749887","wikidata":"https://www.wikidata.org/wiki/Q1165574","display_name":"System monitoring","level":2,"score":0.2802000045776367},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25609999895095825},{"id":"https://openalex.org/C119907115","wikidata":"https://www.wikidata.org/wiki/Q6815725","display_name":"Memory errors","level":3,"score":0.25110000371932983}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3196494.3196540","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196540","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196540","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1704.05004","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1704.05004","pdf_url":"https://arxiv.org/pdf/1704.05004","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3196494.3196540","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196540","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196540","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3538009049","display_name":null,"funder_award_id":"CNS-1657711, CNS-1513783","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4424407468","display_name":"TWC: TTP Option: Medium: Collaborative: ENCORE - ENhanced program protection through COmpiler-REwriter cooperation","funder_award_id":"1513783","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320307102","display_name":"Intel Corporation","ror":"https://ror.org/01ek73717"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2606228508.pdf","grobid_xml":"https://content.openalex.org/works/W2606228508.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W201766245","https://openalex.org/W1511815566","https://openalex.org/W1997394198","https://openalex.org/W2059278087","https://openalex.org/W2096267728","https://openalex.org/W2098806455","https://openalex.org/W2098809490","https://openalex.org/W2106412703","https://openalex.org/W2109219878","https://openalex.org/W2117798902","https://openalex.org/W2121218648","https://openalex.org/W2121562991","https://openalex.org/W2122757982","https://openalex.org/W2154795299","https://openalex.org/W2155851497","https://openalex.org/W2258876169","https://openalex.org/W2790728214","https://openalex.org/W4239035626","https://openalex.org/W4242383889","https://openalex.org/W4245736681","https://openalex.org/W4250981365","https://openalex.org/W4254975025"],"related_works":[],"abstract_inverted_index":{"Memory":[0],"corruption":[1],"vulnerabilities":[2],"in":[3],"C/C++":[4,91],"applications":[5],"enable":[6],"attackers":[7],"to":[8,176,186,218,236],"execute":[9],"code,":[10,154],"change":[11],"data,":[12],"and":[13,43,67,85,118,130,157,212,235],"leak":[14],"information.":[15],"Current":[16],"memory":[17,88,204],"sanitizers":[18],"do":[19],"not":[20],"provide":[21],"comprehensive":[22],"coverage":[23],"of":[24,171,200],"a":[25,97,104,178,182,228],"program\u00bbs":[26],"data.":[27],"In":[28,140],"particular,":[29],"existing":[30,46],"tools":[31,47,60],"focus":[32,48],"primarily":[33],"on":[34,49,93,134,206,220],"heap":[35],"allocations":[36,42],"with":[37,53],"limited":[38,54],"support":[39,55],"for":[40,56,75,90,100,190,230],"stack":[41,117],"globals.":[44],"Orthogonally,":[45],"the":[50,135,165,201],"main":[51],"executable":[52],"system":[57,159,233],"libraries.":[58],"Existing":[59,125],"also":[61],"suffer":[62],"from":[63,164],"both":[64,209],"false":[65,68,128,132,145,148,188],"positives":[66,129],"negatives.":[69],"We":[70],"present":[71],"Comprehensive":[72],"User-Space":[73],"Protection":[74],"C/C++,":[76],"\\sysname,":[77],"an":[78],"LLVM":[79],"sanitizer":[80,229],"that":[81,108,199],"provides":[82],"complete":[83],"spatial":[84],"probabilistic":[86],"temporal":[87],"safety":[89],"programs":[92],"64-bit":[94],"architectures":[95],"(with":[96],"prototype":[98],"implementation":[99],"x86\\_64).":[101],"\\sysname":[102,142,150,175,196,224],"uses":[103],"hybrid":[105],"metadata":[106],"scheme":[107],"supports":[109],"all":[110,152,170,221],"program":[111],"data":[112],"including":[113,155],"globals,":[114],"heap,":[115],"or":[116,147],"maintains":[119],"Application":[120],"Binary":[121],"Interface":[122],"(ABI)":[123],"compatibility.":[124],"approaches":[126],"have":[127],"8%-25%":[131],"negatives":[133,146,189],"NIST":[136],"Juliet":[137],"test":[138],"suite.":[139],"contrast,":[141],"has":[143],"no":[144,187],"positives.":[149],"instruments":[151],"user-space":[153],"libc":[156],"other":[158],"libraries,":[160],"removing":[161],"these":[162],"libraries":[163],"trusted":[166],"computing":[167],"base.":[168],"Supporting":[169],"user":[172],"space":[173],"allows":[174],"treat":[177],"missed":[179],"check":[180],"as":[181,227],"failed":[183],"check,":[184],"leading":[185],"\\sysname.":[191],"The":[192],"overhead":[193,215],"introduced":[194],"by":[195,232],"is":[197,225],"half":[198],"state-of-the-art":[202],"full":[203],"protection":[205],"benchmarks":[207],"where":[208],"mechanisms":[210],"run,":[211],"imposes":[213],"1.58x":[214],"when":[216],"compared":[217],"baseline":[219],"benchmarks.":[222],"Consequently,":[223],"intended":[226],"use":[231],"developers,":[234],"protect":[237],"truly":[238],"critical":[239],"systems.":[240]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":5},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2017-04-28T00:00:00"}
